A Low Complexity Branch and Bound Approach to Optimal Spectrum Balancing for Digital Subscriber Lines Paschalis Tsiaflakis, Jan Vangorp and Marc Moonen
Jan Verlinden
Department of Electrical Engineering Katholieke Universiteit Leuven, Belgium {Paschalis.Tsiaflakis, Jan.Vangorp, Marc.Moonen}@esat.kuleuven.be
DSL Experts Team Alcatel Bell, Belgium
[email protected]
Abstract— Crosstalk is a major source of performance degradation in modern xDSL systems. Optimal Spectrum Balancing (OSB) is an algorithm that mitigates the effect of crosstalk by allocating optimal transmit spectra to all interfering DSL modems. Unfortunately, its complexity grows exponentially with the number of lines in the binder. For multiple user scenarios this becomes computationally intractable. This paper presents a branch and bound approach to OSB. The proposed branch and bound operations require almost no computation keeping the total computational complexity low. Simulations show enormous complexity reductions, especially for a large number of users.
I. I NTRODUCTION The performance of current xDSL systems can be degraded severely by crosstalk, which is typically 10-20 dB larger than the background noise. A promising technique for mitigating the effect of crosstalk is Dynamic Spectrum Management (DSM) [1] [2]. Here the transmit spectrum of each modem is designed to cause only little disturbance to other lines, while preserving a high data rate. Optimal Spectrum Balancing (OSB) [3] [4] is a centralized algorithm that calculates the optimal transmit spectra for a network of interfering DSL lines. By the use of a dual decomposition OSB decouples the spectrum management problem into K independent per-tone optimization problems, where K is the number of tones. However these per-tone optimization problems are non-convex with many local optima. Hence, an exhaustive search was proposed to find the global maximum. Unfortunately the set size of feasible solutions is exponential in the number of users N . This becomes computationally intractable for more than five users. In [5] [6] an iterative approach is presented to solve the pertone optimization problems. It is claimed that these algorithms Paschalis Tsiaflakis is a research assistant with the F.W.O. Vlaanderen. Jan Vangorp is a research assistant with the ESAT/SISTA laboratory. This research work was carried out at the ESAT laboratory of the Katholieke Universiteit Leuven, in the frame of Belgian Programme on Interuniversity Attraction Poles, initiated by the Belgian Federal Science Policy Office IUAP P5/22 and P5/11, Research Project FWO nr.G.0196.02 (‘Design of efficient communication techniques for wireless time-dispersivemulti-user MIMO systems’) and IWT project: ’SOPHIA ’Stabilization and Optimization of the PHysical layer to Improve Applications’ and was partially sponsored by Alcatel-Bell. The scientific responsibility is assumed by its authors.
are computationally tractable for multiple user scenarios and lead to near-optimal performance. Unfortunately, it is not possible to compare their performance with the optimal performance for scenarios with more than five users. In this paper a branch and bound approach is presented to solve the per-tone optimization problem. Branch and bound [7] [8] is a general method for finding optimal solutions of various optimization problems. The proposed branch and bound operations require almost no computation keeping the total computational complexity low. This paper is organized as follows. In section II the system model for the crosstalk environment is described. In section III the spectrum management problem and the OSB algorithm are discussed. In section IV the low complexity branch and bound approach is presented. Finally, in section V the complexity of the proposed branch and bound procedure is compared with the complexity of the exhaustive search. II. S YSTEM M ODEL Most current DSL systems use Discrete Multi-Tone (DMT) modulation. The transmission for a binder of N users can be modelled on each tone k by yk = Hk xk + zk
k = 1 . . . K.
T The vector xk = [x1k , x2k , . . . , xN k ] contains the transmitted signals on tone k for all N users. [Hk ]n,m = hn,m is an k N × N matrix containing the channel transfer functions from transmitter m to receiver n on tone k. The diagonal elements are the direct channels, the off-diagonal elements are the crosstalk channels. zk is the vector of additive noise on tone k, containing thermal noise, alien crosstalk, RFI,. . . . The vector yk contains the received symbols. The transmit power is denoted as snk , ∆f E{|xnk |2 }, the noise power as σkn , ∆f E{|zkn |2 }. The vector containing the transmit power of user n on all tones is sn , [sn1 , sn2 , . . . , snK ]T . The DMT symbol rate is denoted as fs , the tone spacing as ∆f . When the number of interfering modems is large, the interference is well approximated by a Gaussian distribution.
Under this assumption the achievable bit loading of user n on T tone k, given the transmit spectra sk , [s1k , s2k , . . . , sN k ] of all modems in the system, is ! 2 n |hn,n | s 1 n k k (1) bk , log2 1 + P n , |2 sm Γ m6=n |hn,m k k + σk where Γ denotes the SNR-gap to capacity, which is a function of the desired BER, the coding gain and noise margin [9]. The total bit rate for user n is X Rn = fs bnk . k
T Conversely, when the bit loading bk , [b1k , b2k , . . . , bN k ] of all the users is given for a specific tone k, the required transmit power for the modems in the system can be calculated by [3] −1 sk = Dk − Λk Ak Λk σk (2) 2,2 2 N,N 2 2 diag{|h1,1 | } k | , |hk | , . . . , |hk 1 2 bk bk bN k
Dk
,
Λk
, diag{2
[Ak ]n,m σk
, an,m k
In [4] [10] efficient methods are presented to search for the Lagrange multipliers λn , ωn that enforce the constraints. For given Lagrange multipliers, optimization problem (4) is decoupled over the tones, resulting in K independent problems of dimension O(B N ). Unfortunately these optimization problems are non-convex with many local optima. Each pertone optimization problem can be formulated as s1,opt , . . . , sN,opt = argmax k k s1k ,...,sN k
− 1, 2
with
− 1, . . . , 2 − 1} 0 n=m an,m , k Γ|hn,m |2 n = 6 m k
, Γ[σk1 , σk2 , . . . , σkN ]T .
The total power used by user n is then X Pn = snk . k
Note that, based on formulae (1) and (2), every sk corresponds to a bk , and vice versa. Finding optimal transmit spectra sk (referred to as “power loading”) is therefore equivalent to finding optimal bit loads bk (referred to as “bit loading”). The Optimal Spectrum Balancing problem (section III) is mostly presented as a power loading problem. Our branch and bound procedure will be presented as a bit loading problem. III. O PTIMAL S PECTRUM BALANCING The objective is to find the optimal transmit spectra for a binder of interfering DSL lines, maximizing the bit rate of one line subject to total power constraints, spectral mask constraints and bit rate constraints. This is referred to as the spectrum management problem and can be formulated as follows maxs1 ,...,sN R1
decomposition. Using Lagrange multipliers, the constraints causing the coupling over the tones are moved into the cost function: PN s1,opt , . . . , sN,opt = argmaxs1 ,...,sN n=1 ωn Rn PN PK + n=1 λn P n,tot − k=1 snk (4) with 0 ≤ snk ≤ sn,mask , ∀n, ∀k, k λn ≥ 0, ωn ≥ 0 , ∀n.
s.t. s.t. s.t.
Rn ≥ Rn,target , ∀n > 1, P n n , ∀n, k sk ≤ P n,mask n 0 ≤ sk ≤ sk , ∀n, ∀k,
(3)
where Rn,target denotes the target bit rate for modem n and sn,mask denotes the spectral mask for modem n on tone k k. Note that the total power constraints and target bit rate constraints couple the optimization problem over the tones. This results in a solution set with a dimensionality which is exponential in the number of users and tones, namely O(B N K ) where B is the number of possibilities for the bit or power loading for each tone and each user. In [3] [4] it is shown that OSB reduces this dimensionality by a dual
subject to
N X
ωn fs bnk −
λn snk
(5)
n=1
n=1
|
N X
{z 1
0 ≤ snk ≤ sn,mask k
}|
{z 2
n = 1 . . . N.
}
The previously proposed method to solve this per-tone optimization problem is an exhaustive search. As the dimensionality of the solution set is exponential in the number of users, this becomes computationally intractable for more than five lines. Unfortunately, binders typically consist of 20-100 lines. IV. A L OW C OMPLEXITY B RANCH AND B OUND P ROCEDURE FOR OSB Branch and bound [7] [8] is a general technique for finding optimal solutions of various optimization problems. A branch and bound procedure has two ingredients. The first ingredient is a smart way of covering the feasible region by several smaller subregions. This leads to a branching operation. The second ingredient is bounding, which is a way of finding upper and lower bounds for the optimal solution within a feasible subregion. The core of the approach is the simple observation that (for a maximization task) if the upper bound of a subregion A is smaller than the lower bound for some other subregion B, then subregion A may be safely discarded from the search. The efficiency of the method depends critically on the effectiveness of the used branching and bounding operations. There is no universal bounding operation that works for all problems. In the remainder of this section a branch and bound procedure will be presented particularly for the per-tone optimization problem (5). The procedure starts from an initial solution set containing all feasible solutions. A possible initial solution set based on the maximum bit loading of every user is as follows AX B = bk ∈ RN , ∀n : 0 ≤ bnk ≤ bn,M , (6) k AX where bn,M is the maximum bit loading for user n on tone k k. Note that we focus on the bit loading instead of the power
loading (see section II). In [11] it is proven that the power loading increases with increasing bit loading. Based on this fact a tighter initial solution set can be defined by (7) B= bk ∈ RN , ∀n : |hn,n |2 sn,mask n,M AX , bk ) . 0 ≤ bnk ≤ min(log2 1 + Γ1 k σnk k (7) The branching operation splits every region in 2N rectangular subregions. This is done by splitting each dimension (bit loading range for 1 particular user) of the considered region in two. One has several options for splitting a dimension: two equal parts, two parts delimited by integer bit loadings, two parts delimited by fractional bit loadings,. . . . In the case of integer bit loading the branching can be stopped when all the regions have dimensions smaller than or equal to 1 bit. Figure 1 depicts the branching operation starting from an initial solution set for a three-user case. It can be remarked that this “rectangular” branching allows a region (e.g. region I) to be fully characterized by its two extreme points bmin k and bmax as shown in figure 1 (with bn,min ≤ bnk ≤ bn,max k k k for all n, in the considered region). After the branching operation, a number of the generated subregions can be discarded from the search because their bit loadings correspond to power loading combinations that do not satisfy the spectral mask constraints of (5). In [11] it is proven that the power loading increases with increasing bit loading. This means that the point bmin of figure 1 k corresponds to a power loading that is smaller than every other power loading in the considered subregion I. If this point bmin does not satisfy the spectral mask constraint, than k no point of the considered subregion satisfies the spectral mask constraint and so the subregion can be discarded from the search. Formula (2) can be used to check the spectra corresponding to bmin . k The first bound operation is the calculation of a lower bound for the maximum of a subregion. In fact, the cost function value of any bit loading combination of the considered subregion can be used as a lower bound. As the spectra corresponding to bmin have already been calculated to check k the spectral mask constraints, the cost function value of this point can be used as a lower bound. The calculation of the lower bound (8) is a simple sum of products which requires almost no computational complexity.
the upper bounds of term 1 and term 2 is an upper bound for the total expression.
upper boundregion =
N X
ωn fs bn,max − k
N X
λn sn,min . (9) k
n=1
n=1 n,min
Note that the spectra s , ∀n have already been calculated. The calculation of the upper bound (9) is a simple sum of products. As can be seen, the bound operations require almost no computational complexity. The effectiveness of these bounds in discarding regions is checked by simulations. This is presented in the simulations section. The complete branch and bound procedure for optimization problem (5) is presented in algorithm 1. Algorithm 1 Branch and bound procedure for OSB 1: Start from an initial solution set containing all feasible solutions as defined by (6) or (7) 2: Branching: split the region(s) into subregions (e.g. figure 1) 3: Discard the subregions which do not satisfy the spectral mask constraints 4: Bounding: determine lower and upper bounds for the maximum of each subregion as defined by (8) and (9) 5: Determine maximum lower bound M AX low of all subregions. 6: Remove all subregions with a upper bound smaller than M AX low. 7: if desired accuracy achieved then stop 8: else go to step 2 The spectrum management problem (5) takes total power constraints into account. Suffice it to say that in some cases, the spectral mask constraints are so constraining that the power constraints are always met, namely when P total n,mask s ≤ P n,tot , ∀n. In this case (5) reduces to term k k 1 and the calculation of the lower bound and upper bound is simplified to: lower boundregion = upper boundregion =
N X
ωn fs bn,min k
(10)
ωn fs bn,max . k
(11)
n=1 N X
n=1
lower boundregion =
N X
n=1
ωn fs bn,min − k
N X
λn sn,min (8) k
n=1
The second bound operation is the calculation of an upper bound for the maximum of a subregion. Formula (5) consists of two terms. Term 1 increases with increasing bit loading. Term 2 decreases with increasing bit loading because the power loading increases with increasing bit loading [11]. An PN exact upper bound of term 1 is n=1 ωn fs bn,max . An exact k PN upper bound of term two is − n=1 λn sn,min . The sum of k
The effectiveness of the presented branch and bound procedures depends on how fast regions are discarded. We already explained that a region is discarded from the search when this region has an upper bound smaller than the lower bound of any other region. The presence of a region with a large lower bound thus speeds up the convergence. Typically there is a lot of correlation between neighbouring tones. The optimal bit or power loading of tone k does not change a lot from the optimal bit or power loading of tone k + 1. When the optimal bit or power loading of tone k is known, the region containing this
bmax k Region I
b3k [bit]
b3k [bit]
b3k [bit]
16
16
b2k [bit]
16
b2k [bit]
min b2k [bit] bk
16
12
16
16 branch 8 operation
16 b1k [bit]
branch operation
8
8 4 4
16 b1k [bit]
8
12
16
b1k [bit]
AX Fig. 1. Branching operation for a three-user case starting from an initial solution set based on the maximum bit loading with bn,M = 16. Each axis k corresponds to the bit loading of a particular user for tone k. The middle figure emphasizes the fact that a region can be fully characterized by its two points . and bmax bmin k k
V. S IMULATION R ESULTS This section presents simulation results of the proposed branch and bound procedures and their complexity is compared to the complexity of an exhaustive search. The ADSL scenarios use a line diameter of 0.5 mm (24 AWG). The maximum transmit power is 20.4 dBm [12]. The SNR gap Γ is 12.9 dB, corresponding to a coding gain of 3 dB, a noise margin of 6 dB and a target symbol error probability of 10−7 . The tone spacing ∆f is 4.3125 kHz and the DMT symbol rate fs is 4 kHz. The simulations are performed in Matlab on a dual Opteron 250 with 4 GB RAM and a 2.4 GHz processor. A. Symmetric scenario The first scenario is a symmetric scenario and is shown in figure 2. The simulations are performed for a two-user case (N = 2) up to an eight-user case (N = 8). The computational complexity of both the branch and bound procedure and the exhaustive search procedure consists of calculating expression (5) for given Lagrange multipliers λn , ωn and for a particular bit loading. The main part of this computation corresponds to calculating the spectra for a particular bit loading, as defined by formula (2). Table I compares the computational complexity of the branch and bound procedure given by algorithm (1) and the exhaustive search. The ’Users’ column indicates the number of users. The ’% ev of (2)’ column presents the percentage of evaluations of expression (2) with respect to the number of evaluations of expression (2) by the exhaustive search. The ’c.r.f.’ column gives the complexity reduction factor with respect to the exhaustive search. This is the inverse of the previous column and is a good indication of how
CO Modem 1
Modem 1 3000m
Modem 2
Modem 2
Modem N
...
...
3000m
...
optimum can be used in the branch and bound procedure for tone k + 1 as a good approximation of the optimum, having a large lower bound. This simple trick speeds up the convergence significantly. A similar observation is that the optimal bit or power loading of tone k does not change much whenever the Lagrange multipliers λn are updated (towards the values that enforce the total power constraints). A similarly simple trick can then be used to speed up the convergence.
Modem N 3000m
Fig. 2.
Symmetric N -user ADSL scenario
much less computation is needed to converge to the optimal solution. The ’avg p.-t.t.’ column shows the average time needed to solve the per-tone optimization problem (5). The ’ADSL DS’ column shows the time needed to find the optimal spectra of the ADSL Downstream scenario. This is the time needed to solve the per-tone optimization problem (5) for all tones multiplied by the typical number of Lagrange multiplier evaluations needed on average to enforce the constraints. In [4], it is explained that the number of Lagrange multiplier evaluations is typically 50. It can be seen that the complexity reduction factor increases as the number of users increases. For eight users there is an enormous reduction in complexity with a factor 4000. Using the exhaustive search procedure, it is impossible to simulate scenarios with more than five users. With the proposed branch and bound procedures one can simulate up to eight-user scenarios on the same platform. B. Asymmetric scenario The second scenario is an asymmetric scenario and is show in figure 3. The simulations are performed for a two-user case (N = 2) up to an eight-user case (N = 8). The four-user scenario, for example, consists of modem 1 up to modem 4. Table II shows the results for the spectrum management problem with total power constraints and spectral mask constraints. The complexity reduction factors increase with increasing
TABLE I C OMPUTATIONAL COMPLEXITY COMPARISON OF PROPOSED BRANCH AND BOUND PROCEDURE AND EXHAUSTIVE SEARCH PROCEDURE FOR SYMMETRIC ADSL D OWNSTREAM SCENARIO WITH POWER CONSTRAINTS AND SPECTRAL MASK CONSTRAINTS
Users 2 3 4 5 6 7 8
% ev of (2) 12.39 2.72 0.89 0.31 0.13 0.05 0.02
Branch and Bound procedure c.r.f. avg p.-t.t. 8.1 0.0028 sec 36.8 0.0087 sec 112.1 0.0444 sec 321.2 0.2603 sec 740.7 1.9380 sec 1892.8 12.9200 sec 4120.3 104.1349 sec
ADSL DS 31.46 sec 1.63 min 8.29 min 48.58 min 6.03 hour 1.67 day 13.42 day
Exhaustive Search procedure % ev of (2) c.r.f. avg p.-t.t. ADSL DS 100 1 0.0097 sec 109.3 sec 100 1 0.1653 sec 30.85 min 100 1 2.55 sec 7.93 hour 100 1 46.7 sec 6.05 day 100 1 14.2 min 110 day 100 1 (3.8 hour) (4.85 year) 100 1 (2.7 day) (82.6 year)
TABLE II C OMPUTATIONAL COMPLEXITY COMPARISON OF PROPOSED BRANCH AND BOUND PROCEDURE AND EXHAUSTIVE SEARCH PROCEDURE FOR ASYMMETRIC ADSL D OWNSTREAM SCENARIO WITH POWER CONSTRAINTS AND SPECTRAL MASK CONSTRAINTS Branch and Bound procedure % ev of (2) c.r.f. avg p.-t.t. ADSL DS 10.68 9.4 0.0022 sec 25.20 sec 2.10 47.6 0.0064 sec 71.67 sec 0.73 136.6 0.0369 sec 6.89 min 0.26 384.6 0.2239 sec 41.78 min 0.14 697.8 2.1188 sec 6.59 hour 0.06 1601.6 15.94 sec 2.06 day 0.02 4026.5 136.70 sec 17.72 day
Users 2 3 4 5 6 7 8
CO Modem 1
Simulations show enormous complexity reductions of up to factor 4000 for eight-user scenarios .
Modem 1 5000m
Modem 2
Exhaustive Search procedure % ev of (2) c.r.f. avg p.-t.t. ADSL DS 100 1 0.0085 sec 95.14 sec 100 1 0.1496 sec 27.93 min 100 1 2.5637 sec 7.97 hour 100 1 45.90 sec 5.95 day 100 1 14.2 min 110 day 100 1 (3.8 hour) (4.85 year) 100 1 (2.7 day) (82.6 year)
Modem 2 4000m
R EFERENCES
RT1 Modem 3
Modem 3 3500m
500m Modem 4
Modem 4 3000m RT2 Modem 5
Modem 5 3000m
Modem 6
Modem 6 2500m
3000m Modem 7
Modem 7 3000m
Modem 8
Modem 8 3500m
Fig. 3.
Asymmetric N -user ADSL scenario
number of users. For an eight-user case there is a complexity reduction with a factor 4000. VI. C ONCLUSION Optimal Spectrum Balancing is an algorithm to mitigate the effect of crosstalk by allocating optimal transmit spectra in a network of interfering DSL modems. By a dual decomposition this algorithm decouples the spectrum management problem into per-tone optimization problems which are typically solved by an exhaustive search. For multi-user scenarios this becomes computationally intractable. In this paper, a branch and bound procedure is presented with very simple branch and bound operations which require almost no computational complexity.
[1] Thomas Starr, Massimo Sorbara, John M. Cioffi, Peter J. Silverman, DSL Advances, ch. 11. Prentice Hall, 2002. [2] W. Yu, G. Ginis and J. Cioffi, “Distributed Multiuser Power Control for Digital Subscriber Lines,” IEEE J. Sel. Area. Comm., vol. 20, no. 5, pp. 1105–1115, Jun. 2002. [3] R. Cendrillon, W. Yu, M. Moonen, J. Verlinden and T. Bostoen, “Optimal Multi-user Spectrum Management for Digital Subscriber Lines,” accepted for IEEE Trans. Comm. [4] P. Tsiaflakis, J. Vangorp, M. Moonen, J. Verlinden, K. Van Acker, “An Efficient Search Algorithm for the Lagrange Multipliers of Optimal Spectrum Balancing in Multi-user xDSL Systems,” in accepted for publication in IEEE ICASSP, May 2006. [5] Raphael Cendrillon, Marc Moonen, “Iterative Spectrum Balancing for Digital Subscriber Lines,” in International Communications Conference (ICC), May 2005. [6] Raymond Lui and Wei Yu, “Low-Complexity Near-Optimal Spectrum Balancing for Digital Subscriber Lines,” in International Communications Conference (ICC), May 2005. [7] “Definition: Branch and bound,” From Wikipedia, the Free Encyclopedia. [8] P.M. Pardalos, H.E. Romeijn, Handbook of Global Optimization Volume 2 (Nonconvex Optimization and Its Applications), 1 ed. Springer, June 2002. [9] Thomas Starr, John M. Cioffi, Peter J. Silverman, Understanding Digital Subscriber Lines. Prentice Hall, 1999. [10] W. Yu, R. Lui and R. Cendrillon, “Dual Optimization Methods for Multiuser Orthogonal Frequency-Division Multiplex Systems,” in IEEE Globecom, vol. 1, Dec. 2004, pp. 225–229. [11] P. Tsiaflakis, J. Vangorp, M. Moonen, J. Verlinden, “A Low Complexity Branch and Bound Procedure for Optimal Spectrum Balancing in a Multi-User xDSL Environment,” in preparation, 2006. [12] Asymmetrical digital subscriber line (ADSL) transceivers, ITU Std. G.992.1, 1999.